A High-Speed Hardware Implementation of the Hermes8-128 Stream Cipher

Total Page:16

File Type:pdf, Size:1020Kb

A High-Speed Hardware Implementation of the Hermes8-128 Stream Cipher See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/4337029 A high-speed hardware implementation of the Hermes8-128 stream cipher Conference Paper · September 2007 DOI: 10.1109/ECCTD.2007.4529608 · Source: IEEE Xplore CITATIONS READS 3 70 2 authors, including: Paris Kitsos University of Peloponnese 105 PUBLICATIONS 1,130 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Hardware Trojan detection View project All content following this page was uploaded by Paris Kitsos on 19 May 2014. The user has requested enhancement of the downloaded file. A High-Speed Hardware Implementation of the Hermes8-128 Stream Cipher Paris Kitsos Ulrich Kaiser Computer Science Texas Instruments Deutschland GmbH School of Science and Technology 85350 Freising, Germany Hellenic Open University e-mail: [email protected] Patras, Greece e-mail: [email protected] Abstract—An efficient high-speed hardware implementation of The organization of the paper is as following: In section 2, the Hermes8-128 stream cipher is presented in this paper. a brief introduction of the Hermes8-128 stream cipher is Hermes8-128 is proposed for hardware based implementations given. In section 3, the design methodology with the in the eSTREAM project [1]. Two FPGA devices are used for performance metrics are examined. The proposed architecture the hardware implementations. Especially, the XILINX and VLSI implementation are presented in section 4. (Spartan-2) 2S100-6 and (VIRTEX-4) 4VFX12-11 are used. A Implementation results and discussion (comparison with other maximum throughput of 56.5 Mbps can be achieved with a clock works) are reported in section 5. Finally, section 6 concludes frequency of 49 MHz with a XC2S100-6 device, while a this paper. throughput of 361 Mbps at 313 MHz is achieved with the 4VFX12-11 device. Since now only one previous reported II. HERMES8-128 STREAM CIPHER SPECIFICATIONS Hermes8-128 hardware implementation exists, a comparison with the proposed one is given. Hermes8 is based on the Substitution-Permutation- Network (SPN) principle. The substitution (confusion) is I. INTRODUCTION performed by means of an S-BOX. The permutation and diffusion is performed by means of addressing the different The continuous growing of mobility requires that state bytes, the different key bytes, and most importantly the engineers and developers design new cryptographic primitives with special care for speed, security and simplicity. RFID tags, chaining with help of the Accu. A basic block diagram for the smart cards and mobile pervasive-computing are typical Hermes8-128 cipher is illustrated in Fig. 1. examples of products where the amount of memory and power is very limited. The hardware implementations of today’s algorithms, such as the AES cipher, are costly for devices with limited hardware resources, e.g. chip area or FPGA logic units. So, stream ciphers are useful in cases that low hardware complexity is needed. The European Network of Excellence in Cryptology set up the eSTREAM project [1] with the main task to provide and recommend efficient stream ciphers for a wide variety of Figure 1. The basic Data Flow Diagram of the Hermes8 Stream Cipher applications. One of the candidates is the Hermes8 [2] stream cipher. This cipher is proposed for both software (Profile-I) Hermes8-128 contains 16 key bytes and 37 state bytes. and hardware (Profile-ΙI) byte-orientated implementations, There are two pointers involved: p1 addresses one of the state e.g. Hermes8-128 with a key length of 16 bytes. Until now, bytes, p2 addresses one of the key bytes (see Fig. 1). The one hardware implementation [3] of the Hermes8 has been pointers obey modulo addition operation in order to assure presented in the literature. Its implementation is very compact, that they always address valid register space. The use of but with the drawback of performance. The proposed pointers is favorable over shift register designs when low- implementation has a different philosophy than that in [3] with power requirements are dominating the design. the major goal to increase the performance for efficient use in The core state operation (called sub-round) consists of the applications with high throughput requirements. following steps: While evaluating the performance of Profile-II candidates 1. Select a certain state byte and EXOR it with Accu, area requirements and time performance of an implementation 2. Select a certain key byte and EXOR it with previous result, are the most important metrics [4]. 3. Take the previous result and apply the S-BOX function, 4. Store the previous result in Accu, The maximum clock frequency, given in MHz, is determined 5. Copy Accu into the same state byte selected in step 1. by the critical path of the circuit. The S-BOX is 8-bit wide in order to provide a proper non- · Total Throughput (T) linear Boolean function needed for substitution, i.e. confusion. The total throughput of the algorithm expresses the number of First choice is the known S-BOX of AES which is strong cipher text bits simultaneously generated by the algorithm per against differential cryptanalysis, however random number second. It can be calculated from the following equation as: based S-BOXes are also suitable, if their differential #bits´ F distribution table (ddt) demonstrates good quality with respect T = (1) #clock cycles to differential cryptanalysis attacks. The key bytes are modified every KEY_STEP3, i.e. seven steps, during the sub- IV. HERMES8-128 HARDWARE ARCHITECTURE round loops depending on the position of p2. Two temporary Hermes8 is designed with a dedicated byte hardware pointers p3 and p4 are addressing the key bytes following the implementation. The architecture that performs the Hermes8- byte addresses by p2. The byte k[p2] is not modified because 128 stream cipher’s key stream is shown in Fig. 2. This it has to be used in the following sub-round. But the bytes architecture mainly consists of the State Register, the Key k[p3] and k[p4] are ‘rather old’ and are therefore candidates Register, one S-Box and the Accu register. In addition, some for modification; they are replaced by SBOX[ k[p3] exor multiplexers are there that support the correct operation of the k[p2] ] and SBOX[ k[p4] exor k[p2] ] respectively. The Hermes8-128 cipher. exor’ing with k[p2] is advantageous over the direct application of the SBOX, because the inverse function of the SBOX does Two important modules are the Modulo Counters ge- nerator and the Control Unit. The Modulo Counters generate exist. Therefore, backtracking is hampered by means of this the appropriate count values (p1, p2, etc) used by the cipher. method. The dashed pointer in Fig. 2 represents the next p2 position (because KEY_STEP1=3) when addressing the next For the initialization of these counters some predefined key byte needed for the next sub-round. values (derived from the XOR of a number of key-bytes) must A similar method is followed for the key stream ks[] be loaded. The Control Unit produces all signals that are generation. The key stream bytes are derived from the state responsible for the correct synchronization and operation of bytes state[]. Since the pointer p1 has been incremented after the overall design. the last sub-round, it points to the ‘oldest’ available state byte. Fig. 3 shows the implementation of the State Register. This is the first byte to be packed into the key stream block of Actually this register is consisting of 37 byte registers, a sixteen bytes. Then further bytes follow by means of output pointer po that is incremented by two in order to separate codec circuit, and 37 2-input byte OR gates. This register consecutive sub-rounds from each other. Since a new output initially stores the 37 IV bytes and each byte is updated by block of key stream bytes follows not earlier than the next the output of the Accu register through the 2x1 byte OR STREAM_ROUNDS=3 are completed, the state byte contents gates. The circuit block codec has as input the p1 value and corresponding to the same address are separated by 3 x 37 produces the proper byte register enable signals in order to sub-rounds. During these 111 Hermes8-128 sub-rounds there update the right byte at the right time according to the p1 are nearly 16 occurrences of key modification, i.e. about 32 value. key bytes are modified per output block in relation to 16 key byte registers. More information and also the Hermes8-128 cipher pseudo code can be found in the original specification and a related paper [2]. III. DESIGN METHODOLOGY The design of Hermes8-128 is developed in VHDL with structural description logic such that it can be synthesized for FPGA devices. Especially two XILINX FPGA devices [5], the SPARTAN-II XC2S30 and VIRTEX-IV X4VFX12, are Figure 3. The Implementation of the State Register used in order to evaluate the performance of the proposed implementation. To evaluate the performance of the proposed Finally, the implementation of the Key Register is implementation the following performance metrics will be depicted in Fig. 4. This register consist of 16 byte registers, used in this paper. 16 2x1 8-bit Multiplexers (MUXes), three 16x1 byte Mul- tiplexers (MUXes), 16 2-input byte OR gates, two S-Boxes · Circuit Area (A) and 16 3x1 OR gates. In this register initially the 16 key bytes The term A represents the total circuit area that is required for are stored and each byte is updated either by the K[p3]new or the implementation, expressed in CLB numbers (# CLBs). K[p4]new values through the 2x1 byte MUXes.
Recommended publications
  • A Differential Fault Attack on MICKEY
    A Differential Fault Attack on MICKEY 2.0 Subhadeep Banik and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute Kolkata, 203, B.T. Road, Kolkata-108. s.banik [email protected], [email protected] Abstract. In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream's hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that if the adversary can induce random single bit faults in the internal state of the cipher, then by injecting around 216:7 faults and performing 232:5 computations on an average, it is possible to recover the entire internal state of MICKEY at the beginning of the key-stream generation phase. We further consider the scenario where the fault may affect at most three neighbouring bits and in that case we require around 218:4 faults on an average. Keywords: eStream, Fault attacks, MICKEY 2.0, Stream Cipher. 1 Introduction The stream cipher MICKEY 2.0 [4] was designed by Steve Babbage and Matthew Dodd as a submission to the eStream project. The cipher has been selected as a part of eStream's final hardware portfolio. MICKEY is a synchronous, bit- oriented stream cipher designed for low hardware complexity and high speed. After a TMD tradeoff attack [16] against the initial version of MICKEY (ver- sion 1), the designers responded by tweaking the design by increasing the state size from 160 to 200 bits and altering the values of some control bit tap loca- tions.
    [Show full text]
  • Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng
    Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1 Introduction – Chris Eng _ Director of Security Services, Veracode _ Former occupations . 2000-2006: Senior Consulting Services Technical Lead with Symantec Professional Services (@stake up until October 2004) . 1998-2000: US Department of Defense _ Primary areas of expertise . Web Application Penetration Testing . Network Penetration Testing . Product (COTS) Penetration Testing . Exploit Development (well, a long time ago...) _ Lead developer for @stake’s now-extinct WebProxy tool 2 Assumptions _ This talk is aimed primarily at penetration testers but should also be useful for developers to understand how your application might be vulnerable _ Assumes basic understanding of cryptographic terms but requires no understanding of the underlying math, etc. 3 Agenda 1 Problem Statement 2 Crypto Refresher 3 Analysis Techniques 4 Case Studies 5 Q & A 4 Problem Statement 5 Problem Statement _ What do you do when you encounter unknown data in web applications? . Cookies . Hidden fields . GET/POST parameters _ How can you tell if something is encrypted or trivially encoded? _ How much do I really have to know about cryptography in order to exploit implementation weaknesses? 6 Goals _ Understand some basic techniques for analyzing and breaking down unknown data _ Understand and recognize characteristics of bad crypto implementations _ Apply techniques to real-world penetration tests 7 Crypto Refresher 8 Types of Ciphers _ Block Cipher . Operates on fixed-length groups of bits, called blocks . Block sizes vary depending on the algorithm (most algorithms support several different block sizes) . Several different modes of operation for encrypting messages longer than the basic block size .
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • Stream Ciphers (Contd.)
    Stream Ciphers (contd.) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives • Non-linear feedback shift registers • Stream ciphers using LFSRs: – Non-linear combination generators – Non-linear filter generators – Clock controlled generators – Other Stream Ciphers Low Power Ajit Pal IIT Kharagpur 1 Non-linear feedback shift registers • A Feedback Shift Register (FSR) is non-singular iff for all possible initial states every output sequence of the FSR is periodic. de Bruijn Sequence An FSR with feedback function fs(jj−−12 , s ,..., s jL − ) is non-singular iff f is of the form: fs=⊕jL−−−−+ gss( j12 , j ,..., s jL 1 ) for some Boolean function g. The period of a non-singular FSR with length L is at most 2L . If the period of the output sequence for any initial state of a non-singular FSR of length L is 2L , then the FSR is called a de Bruijn FSR, and the output sequence is called a de Bruijn sequence. Low Power Ajit Pal IIT Kharagpur 2 Example f (,xxx123 , )1= ⊕⊕⊕ x 2 x 3 xx 12 t x1 x2 x3 t x1 x2 x3 0 0 0 0 4 0 1 1 1 1 0 0 5 1 0 1 2 1 1 0 6 0 1 0 3 1 1 1 3 0 0 1 Converting a maximal length LFSR to a de-Bruijn FSR Let R1 be a maximum length LFSR of length L with linear feedback function: fs(jj−−12 , s ,..., s jL − ). Then the FSR R2 with feedback function: gs(jj−−12 , s ,..., s jL − )=⊕ f sjj−−12 , s ,..., s j −L+1 is a de Bruijn FSR.
    [Show full text]
  • An Analysis of the Hermes8 Stream Ciphers
    An Analysis of the Hermes8 Stream Ciphers Steve Babbage1, Carlos Cid2, Norbert Pramstaller3,andH˚avard Raddum4 1 Vodafone Group R&D, Newbury, United Kingdom [email protected] 2 Information Security Group, Royal Holloway, University of London Egham, United Kingdom [email protected] 3 IAIK, Graz University of Technology Graz, Austria [email protected] 4 Dept. of Informatics, The University of Bergen, Bergen, Norway [email protected] Abstract. Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher’s key schedule and discuss some properties of ci- phers with similar algebraic structure to Hermes8. Keywords: Hermes8, Stream Cipher, Cryptanalysis. 1 Introduction Hermes8 is one of the 34 stream ciphers submitted to eSTREAM, the ECRYPT Stream Cipher Project [3]. The cipher has a simple byte-oriented design, con- sisting of substitutions and shifts of the state register bytes. Two versions of the cipher have been proposed. Originally, the cipher Hermes8 [6] was submitted as candidate to eSTREAM. Although no weaknesses of Hermes8 were found dur- ing the first phase of evaluation, the cipher did not seem to present satisfactory performance in either software or hardware [4]. As a result, a slightly modified version of the cipher, named Hermes8F [7], was submitted for consideration dur- ing the second phase of eSTREAM.
    [Show full text]
  • A 32-Bit RC4-Like Keystream Generator
    A 32-bit RC4-like Keystream Generator Yassir Nawaz1, Kishan Chand Gupta2 and Guang Gong1 1Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON, N2L 3G1, CANADA 2Centre for Applied Cryptographic Research University of Waterloo Waterloo, ON, N2L 3G1, CANADA [email protected], [email protected], [email protected] Abstract. In this paper we propose a new 32-bit RC4 like keystream generator. The proposed generator produces 32 bits in each iteration and can be implemented in software with reasonable memory requirements. Our experiments show that this generator is 3.2 times faster than original 8-bit RC4. It has a huge internal state and offers higher resistance against state recovery attacks than the original 8-bit RC4. We analyze the ran- domness properties of the generator using a probabilistic approach. The generator is suitable for high speed software encryption. Keywords: RC4, stream ciphers, random shuffle, keystream generator. 1 Introduction RC4 was designed by Ron Rivest in 1987 and kept as a trade secret until it leaked in 1994. In the open literatures, there is very small number of proposed keystream generator that are not based on shift registers. An interesting design approach of RC4 which have originated from exchange- shuffle paradigm [10], is to use a relatively big table/array that slowly changes with time under the control of itself. As discussed by Goli´c in [5], for such a generator a few general statistical properties of the keystream can be measured by statistical tests and these criteria are hard to establish theoretically.
    [Show full text]
  • Iso/Iec 18033-4:2005(E)
    This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-906455 INTERNATIONAL ISO/IEC STANDARD 18033-4 First edition 2005-07-15 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers Technologies de l'information — Techniques de sécurité — Algorithmes de chiffrement — Partie 4: Chiffrements en flot Reference number ISO/IEC 18033-4:2005(E) © ISO/IEC 2005 This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-906455 ISO/IEC 18033-4:2005(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. © ISO/IEC 2005 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body in the country of the requester.
    [Show full text]
  • The Rc4 Stream Encryption Algorithm
    TTHEHE RC4RC4 SSTREAMTREAM EENCRYPTIONNCRYPTION AALGORITHMLGORITHM William Stallings Stream Cipher Structure.............................................................................................................2 The RC4 Algorithm ...................................................................................................................4 Initialization of S............................................................................................................4 Stream Generation..........................................................................................................5 Strength of RC4 .............................................................................................................6 References..................................................................................................................................6 Copyright 2005 William Stallings The paper describes what is perhaps the popular symmetric stream cipher, RC4. It is used in the two security schemes defined for IEEE 802.11 wireless LANs: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We begin with an overview of stream cipher structure, and then examine RC4. Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. Figure 1 is a representative diagram of stream cipher structure. In this structure a key is input to a pseudorandom bit generator that produces a stream
    [Show full text]
  • On the Design and Analysis of Stream Ciphers Hell, Martin
    On the Design and Analysis of Stream Ciphers Hell, Martin 2007 Link to publication Citation for published version (APA): Hell, M. (2007). On the Design and Analysis of Stream Ciphers. Department of Electrical and Information Technology, Lund University. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 On the Design and Analysis of Stream Ciphers Martin Hell Ph.D. Thesis September 13, 2007 Martin Hell Department of Electrical and Information Technology Lund University Box 118 S-221 00 Lund, Sweden e-mail: [email protected] http://www.eit.lth.se/ ISBN: 91-7167-043-2 ISRN: LUTEDX/TEIT-07/1039-SE c Martin Hell, 2007 Abstract his thesis presents new cryptanalysis results for several different stream Tcipher constructions.
    [Show full text]
  • Linear Statistical Weakness of Alleged RC4 Keystream Generator
    Linear Statistical Weakness of Alleged RC4 Keystream Generator Jovan Dj. GoliC * School of Electrical Engineering, University of Belgrade Bulevar Revolucije 73, 11001 Beograd, Yugoslavia Abstract. A keystream generator known as RC4 is analyzed by the lin- ear model approach. It is shown that the second binary derivative of the least significant bit output sequence is correlated to 1 with the corre- lation coefficient close to 15 ' 2-3" where n is the variable word size of RC4. The output sequence length required for the linear statistical weak- ness detection may be realistic in high speed applications if n < 8. The result can be used to distinguish RC4 from other keystream generators and to determine the unknown parameter n, as well as for the plaintext uncertainty reduction if n is small. 1 Introduction Any keystream generator for practical stream cipher applications can generally be represented as an aiit,onomous finite-state machine whose initial state and possibly the next-state and output functions as well are secret key dependent. A common type of keystream generators consists of a number of possibly irregularly clocked linear feedback shift registers (LFSRs) that are combined by a function with or without memory. Standard cryptographic criteria such as a large period, a high linear complexity, and good statistical properties are thus relatively easily satisfied, see [16], [17], but such a generator may in principle be vulnerable to various divide-and-conquer attacks in the known plaintext (or ciphertext-only) scenario, where the objective is to reconstruct, the secret key controlled LFSR initial states from the known keystream sequence, for a survey see [17] and [6].
    [Show full text]
  • MICKEY 2.0. 85: a Secure and Lighter MICKEY 2.0 Cipher Variant With
    S S symmetry Article MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT Ahmed Alamer 1,2,*, Ben Soh 1 and David E. Brumbaugh 3 1 Department of Computer Science and Information Technology, School of Engineering and Mathematical Sciences, La Trobe University, Victoria 3086, Australia; [email protected] 2 Department of Mathematics, College of Science, Tabuk University, Tabuk 7149, Saudi Arabia 3 Techno Authority, Digital Consultant, 358 Dogwood Drive, Mobile, AL 36609, USA; [email protected] * Correspondence: [email protected]; Tel.: +61-431-292-034 Received: 31 October 2019; Accepted: 20 December 2019; Published: 22 December 2019 Abstract: Lightweight stream ciphers have attracted significant attention in the last two decades due to their security implementations in small devices with limited hardware. With low-power computation abilities, these devices consume less power, thus reducing costs. New directions in ultra-lightweight cryptosystem design include optimizing lightweight cryptosystems to work with a low number of gate equivalents (GEs); without affecting security, these designs consume less power via scaled-down versions of the Mutual Irregular Clocking KEYstream generator—version 2-(MICKEY 2.0) cipher. This study aims to obtain a scaled-down version of the MICKEY 2.0 cipher by modifying its internal state design via reducing shift registers and modifying the controlling bit positions to assure the ciphers’ pseudo-randomness. We measured these changes using the National Institutes of Standards and Testing (NIST) test suites, investigating the speed and power consumption of the proposed scaled-down version named MICKEY 2.0.85.
    [Show full text]
  • New Developments in Cryptology Outline Outline Block Ciphers AES
    New Developments in Cryptography March 2012 Bart Preneel Outline New developments in cryptology • 1. Cryptology: concepts and algorithms Prof. Bart Preneel • 2. Cryptology: protocols COSIC • 3. Public-Key Infrastructure principles Bart.Preneel(at)esatDOTkuleuven.be • 4. Networking protocols http://homes.esat.kuleuven.be/~preneel • 5. New developments in cryptology March 2012 • 6. Cryptography best practices © Bart Preneel. All rights reserved 1 2 Outline Block ciphers P1 P2 P3 • Block ciphers/stream ciphers • Hash functions/MAC algorithms block block block • Modes of operation and authenticated cipher cipher cipher encryption • How to encrypt/sign using RSA C1 C2 C3 • Multi-party computation • larger data units: 64…128 bits •memoryless • Concluding remarks • repeat simple operation (round) many times 3 3-DES: NIST Spec. Pub. 800-67 AES (2001) (May 2004) S S S S S S S S S S S S S S S S • Single DES abandoned round • two-key triple DES: until 2009 (80 bit security) • three-key triple DES: until 2030 (100 bit security) round MixColumnsS S S S MixColumnsS S S S MixColumnsS S S S MixColumnsS S S S hedule Highly vulnerable to a c round • Block length: 128 bits related key attack • Key length: 128-192-256 . Key S Key . bits round A $ 10M machine that cracks a DES Clear DES DES-1 DES %^C& key in 1 second would take 149 trillion text @&^( years to crack a 128-bit key 1 23 1 New Developments in Cryptography March 2012 Bart Preneel AES variants (2001) AES implementations: • AES-128 • AES-192 • AES-256 efficient/compact • 10 rounds • 12 rounds • 14 rounds • sensitive • classified • secret and top • NIST validation list: 1953 implementations (2008: 879) secret plaintext plaintext plaintext http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html round round.
    [Show full text]